1 talk mention this tool across 1 BSides chapters.
Deceptive identity and credential infrastructure deployed across cloud environments to detect adversary reconnaissance and privilege escalation attempts through fake IAM accounts, API keys, and embedded secrets